7.5
CVE-2025-30192
- EPSS 0.02%
- Published 21.07.2025 12:49:31
- Last modified 22.07.2025 13:06:07
- Source security@open-xchange.com
- Teams watchlist Login
- Open Login
An attacker spoofing answers to ECS enabled requests sent out by the Recursor has a chance of success higher than non-ECS enabled queries. The updated version include various mitigations against spoofing attempts of ECS enabled queries by chaining ECS enabled requests and enforcing stricter validation of the received answers. The most strict mitigation done when the new setting outgoing.edns_subnet_harden (old style name edns-subnet-harden) is enabled.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
This information is available to logged-in users. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
VendorPowerDNS
≫
Product
Recursor
Default Statusaffected
Version
5.0.12
Status
unaffected
Version
5.1.6
Status
unaffected
Version
5.2.4
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.052 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
security@open-xchange.com | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-345 Insufficient Verification of Data Authenticity
The product does not sufficiently verify the origin or authenticity of data, in a way that causes it to accept invalid data.